4
Cisco RV180/RV180W Administration Guide 77
Configuring the Firewall
This chapter contains information about configuring the firewall properties of the
Cisco RV180/RV180W and includes the following sections:
• Cisco RV180/RV180W Firewall Features, page 77
• Configuring Access Rules, page 78
• Configuring Attack Prevention, page 83
• Configuring Content Filtering, page 84
• Configuring URL Blocking, page 86
• Configuring Port Triggering, page 87
• Configuring Port Forwarding, page 88
• Configuring a DMZ Host, page 92
• Configuring Advanced Firewall Settings, page 92
• Firewall Configuration Examples, page 100
Cisco RV180/RV180W Firewall Features
You can secure your network by creating and applying access rules that the
Cisco RV180/RV180W uses to selectively block and allow inbound and outbound
Internet traffic. You then specify how and to what devices the rules apply. You can
configure the following:
• Services or traffic types (examples: web browsing, VoIP, other standard
services and also custom services that you define) that the router should
allow or block.
• Rules for outbound (from your LAN to the Internet) or inbound (from the
Internet to your LAN) traffic.